scholarly journals Preventing Counterfeit Products using Cryptography, QR Code and Webservice

2021 ◽  
Vol 11 (1) ◽  
pp. 1-11
Author(s):  
Cheman Shaik

Counterfeit production is a threat for every genuine business causing damage to their brand image and stealing their revenues. The aim of this paper is topresenta novel method to prevent counterfeit products using cryptography, QR code and webservice. The method requires that every original product manufacturer obtain a cryptographic key pair, securely store their private key and publish their public key on their website as a QR code. The product manufacturer needs to print a unique item code on their product packs and provide inside the pack a QR code encoding the ciphertext generated by encrypting the item code with their private key. For product verification by buyers, the manufacture is required to provide a QR code scanning app for download on their website, Google Play Store or iPhone App Store. The scanning app should have additional cryptographic functionality to decrypt ciphertext of the item code encoded in the QR code. The manufacturer also needs to launch a simple webservice on his hosting server to accept requests from the mobile app and verify the item code and buyer’s name in its database. Technicalimplementation and the verification process are described in detail through figures and flowchart. The method can be implemented even by small manufacturers with nominal cost by obtaining a key pair and creating a scanning app and webservices. We have also tested the method with an actual software code written for cryptographic operations using the Java cryptography Extension and QR code operations using Google Zxing libraries.

2021 ◽  
Vol 12 (1) ◽  
pp. 1-11
Author(s):  
Cheman Shaik

In this paper, we present a novel solution to detect forgery and fabrication in passports and visas using cryptography and QR codes. The solution requires that the passport and visa issuing authorities obtain a cryptographic key pair and publish their public key on their website. Further they are required to encrypt the passport or visa information with their private key, encode the ciphertext in a QR code and print it on the passport or visa they issue to the applicant. The issuing authorities are also required to create a mobile or desktop QR code scanning app and place it for download on their website or Google Play Store and iPhone App Store. Any individual or immigration uthority that needs to check the passport or visa for forgery and fabrication can scan its QR code, which will decrypt the ciphertext encoded in the QR code using the public key stored in the app memory and displays the passport or visa information on the app screen. The details on the app screen can be compared with the actual details printed on the passport or visa. Any mismatch between the two is a clear indication of forgery or fabrication. Discussed the need for a universal desktop and mobile app that can be used by immigration authorities and consulates all over the world to enable fast checking of passports and visas at ports of entry for forgery and fabrication


Author(s):  
Mingliang Xu ◽  
Qingfeng Li ◽  
Jianwei Niu ◽  
Hao Su ◽  
Xiting Liu ◽  
...  

Quick response (QR) codes are usually scanned in different environments, so they must be robust to variations in illumination, scale, coverage, and camera angles. Aesthetic QR codes improve the visual quality, but subtle changes in their appearance may cause scanning failure. In this article, a new method to generate scanning-robust aesthetic QR codes is proposed, which is based on a module-based scanning probability estimation model that can effectively balance the tradeoff between visual quality and scanning robustness. Our method locally adjusts the luminance of each module by estimating the probability of successful sampling. The approach adopts the hierarchical, coarse-to-fine strategy to enhance the visual quality of aesthetic QR codes, which sequentially generate the following three codes: a binary aesthetic QR code, a grayscale aesthetic QR code, and the final color aesthetic QR code. Our approach also can be used to create QR codes with different visual styles by adjusting some initialization parameters. User surveys and decoding experiments were adopted for evaluating our method compared with state-of-the-art algorithms, which indicates that the proposed approach has excellent performance in terms of both visual quality and scanning robustness.


Author(s):  
Nina Ferreri ◽  
Christopher B. Mayhorn

As digital technology develops, users create expectations for performance that may be violated when malfunctions occur. This project examined how priming expectations of technology performance (high v. low v. no) and experiences of technology malfunction (present v. not present) can influence feelings of frustration and performance on a task. A preliminary sample of 42 undergraduate participants completed a QR code scavenger hunt using the augmented reality mobile app, ARIS. Following the task, participants reported what they found for each scavenger hunt clue, their responses to failures in digital technology, and technology acceptance attitudes. Several factorial ANOVAs revealed a main effect for expectation on adaptive items of the RFDT scale and a main effect for malfunction on performance level. This suggests a potential contradiction between attitudes and behaviors when considering a common scenario involving technology.


BMJ Open ◽  
2018 ◽  
Vol 8 (3) ◽  
pp. e018299 ◽  
Author(s):  
Titus Josef Brinker ◽  
Bianca Lisa Faria ◽  
Martina Gatzka ◽  
Olber Moreira de Faria ◽  
Markus V Heppt ◽  
...  

IntroductionThe incidence of melanoma is increasing faster than any other major cancer both in Brazil and worldwide. The Southeast of Brazil has especially high incidences of melanoma, and early detection is low. Exposure to UV radiation represents a primary risk factor for developing melanoma. Increasing attractiveness is a major motivation for adolescents for tanning. A medical student-delivered intervention that harnesses the broad availability of mobile phones as well as adolescents’ interest in their appearance may represent a novel method to improve skin cancer prevention.Methods and analysisWe developed a free mobile app (Sunface), which will be implemented in at least 30 secondary school classes, each with 21 students (at least 30 classes with 21 students for control) in February 2018 in Southeast Brazil via a novel method called mirroring. In a 45 min classroom seminar, the students’ altered three-dimensional selfies on tablets are ‘mirrored’ via a projector in front of their entire class, showing the effects of unprotected UV exposure on their future faces. External block randomisation via computer is performed on the class level with a 1:1 allocation. Sociodemographic data, as well as skin type, ancestry, UV protection behaviour and its predictors are measured via a paper–pencil questionnaire before as well as at 3 and 6 months postintervention. The primary end point is the group difference in the 30-day prevalence of daily sunscreen use at a 6-month follow-up. Secondary end points include (1) the difference in daily sunscreen use at a 3-month follow-up, (2) if a self-skin examination in accordance with the ABCDE rule was performed within the 6-month follow-up and (3) the number of tanning sessions.Ethics and disseminationEthical approval was obtained from the ethics committee of the University of Itauna. Results will be disseminated at conferences and in peer-reviewed journals.Trial registration numberNCT03178240; Pre-results.


2020 ◽  
Vol 17 (4) ◽  
pp. 554-561
Author(s):  
MuthuKumar Arunachalamand ◽  
Kavipriya Amuthan

Currently frequent biometric scientific research such as with biometric applications like face, iris, voice, hand-based biometrics traits like palm print and fingerprint technique are utilized for spotting out the persons. These specific biometrics habits have their own improvement and weakness so that no particular biometrics can adequately opt for all terms like the accuracy and cost of all applications. In recent times, in addition, to distinct with the hand-based biometrics technique, Finger Knuckle Print (FKP) has been appealed to boom the attention among biometric researchers. The image template pattern formation of FKP embraces the report that is suitable for spotting the uniqueness of individuality. This FKP trait observes a person based on the knuckle print and the framework in the outer finger surface. This FKP feature determines the line anatomy and finger structures which are well established and persistent throughout the life of an individual. In this paper, a novel method for personal identification will be introduced, along with that data to be stored in a secure way has also been proposed. The authentication process includes the transformation of features using 2D Log Gabor filter and Eigen value representation of Multi-Manifold Discriminant Analysis (MMDA) of FKP. Finally, these features are grouped using k-means clustering for both identification and verification process. This proposed system is initialized based on the FKP framework without a template based on the fuzzy vault. The key idea of fuzzy vault storing is utilized to safeguard the secret key in the existence of random numbers as chaff pints


EP Europace ◽  
2021 ◽  
Vol 23 (Supplement_3) ◽  
Author(s):  
M Jastrzebski ◽  
P Moskal

Abstract Funding Acknowledgements Type of funding sources: Public Institution(s). Main funding source(s): Polish Cardiac Society - Section of Non-invasive Electrocardiology and Telemonitoring (PTK SENIT) Background. Electrocardiographical localization of accessory pathways (AP) in WPW syndrome remains an elusive goal. Despite several, often very complex algorithms that were developed over the last three decades, none of them is very accurate  - as demonstrated by several independent validation studies. Moreover, algorithms are difficult to remember, which further limits their usefulness. The accessory pathway regions are arbitrary and transitions between them are smooth, not binary. The same applies to ECG features such as QRS polarity – they are not binary. Moreover, even the most careful ECG lead placement cannot compensate for the variability in heart position within the chest. Therefore, it is unrealistic to expect that any ECG feature or feature set will precisely identify a particular location in a 0 vs. 1 fashion. Aim We intend to create a mobile app / web based localizing application, that would support a novel method for AP localization: a colour density map generator  - based on actual distribution of a sizable number of accessory pathway with a particular QRS features. Methods A total of 881 consecutive AP ablation procedures were reviewed and patients with successful ablation of an overt accessory pathway were included.  ECG with baseline and full preexcitation obtained during incremental atrial pacing were obtained. AP localization was based on stored fluoroscopic images in several projections and procedure description. Each AP localization, as well as QRS polarity in all 12 leads, separately for full and baseline preexcitation patterns, were coded and introduced into the application database. An application web-based, optimized for mobile devices was developed. This application enabled to graphically show changing localization of AP with regard to the introduced, at each step, QRS polarity in a particular ECG lead. User can choose his/her own steps or criteria; there is no need to adhere to the proposed steps. Results A total of 604 patients/ ECGs were available for density map generation. With each additional lead QRS information introduced into the application the user can appreciate more and more precise localization of the AP.  This quickly enables to pinpoint the area of maximum probability, i.e. the most likely/frequent location, followed by the immediate adjacent locations. Representative screen shots of to typical inital steps for left- and right-sided APs are provided below (Figure 1 and Figure 2). Limited prospective assessment was very favourable. Conclusions A novel method, easy to use, not requiring to remember any algorithmic steps, and based on an analysis of by far the largest cohort of over accessory pathways (in comparison with published algorithms) was developed. Prospective validation of the localization application seems warranted. Abstract Figure.


Author(s):  
Rajesh T. M. ◽  
Kavyashree Dalawai

For security purposes of important documents and transactions in real world applications, we generally use biometric techniques for the authentication and validation of a person. If one has to achieve accurate results in the identification and verification process using a signature in text images as a biometric trait, we need to remove the skew of the signature in text images. In the preprocessing stage many phases are being carried out, among these phases, the signature in the text image, skew detection is the most significant phase, because these deskewed results will be used as one of the features in the feature extraction phase to identify and verify the signature. In this article we are proposing a novel method for skew detection of the signatures in text images using an estimation and maximization (EM) algorithm which is efficient and fast. The EM algorithm sequentially works in two stages, the combination of estimation (E-step) and the maximization (M-step) which helps in detection of the skew in skewed signatures in text image accurately.


Author(s):  
Anton Morozov ◽  
Andrey Shastitko

In many cases of competition law enforcement counterfeit goods are not included within the product-market boundaries on an equal basis with the original product. However, existing literature highlights that illegal copies should be included in market boundaries, since from the consumer's viewpoint counterfeit is a substitute of an original good. In this article, we determine the conditions under which counterfeit products should be included either in market shares of original producers or when counterfeit manufacturers should be recognized as right holder competitors. We conclude that in case of strong network effects counterfeit product should be included in the market share of the right holder. On the contrary, when network effects are weak, pirates or counterfeit manufacturers should be considered as competitors of original product producers.


Author(s):  
Chung Seng Keau ◽  
Chin Kim On ◽  
Mohd Hanafi Ahmad Hijazi ◽  
Manmeet Mahinderjit Singh

Manual time and attendance systems are still being practiced within a considerable number of universities, colleges, government departments and companies. This traditional system requires the user to fill in their timesheets or sign on the attendance sheet manually. The practice inefficient and ineffective for university’s student attendance recording due to,  i) lecturer may lose the attendance sheet, ii) student may sign for their friends, iii) student may forget to sign on the attendance sheet, and iv) challenging to monitor attendance rate and analysis. Thus, there is a necessity to change these traditional attendance recording methods to a more efficient one. The attendance rate is significant because students are more likely to succeed in academics when they attend classes consistently. As such, a mobile app, namely Smart-Hadir, is designed to overcome problems as mentioned above. Smart-Hadir is a smartphone application developed by UMS aimed to record student attendance digitally during a class session. The technology used is slightly different from the existing applications, where Smart-Hadir is not using RFID technology but rather covers NFC, QR code, and beacon technologies. Attendance could be taken either using NFC or QR code displayed on the wall using a projector or scan the available beacon. Lecturers can create class session using the Smart-Hadir anywhere and anytime. Students are then required to take their attendance either scan the QR code, search the beacon, or swiped their student card on the lecturer’s phone. The students’ attendance will be immediately captured and saved into the database. Lecturers will be able to view the statistic report, identify and e-mail absentees, as well as monitor students’ attendance behaviour. A statistical report can be generated. It shows the percentages of students’ attendance rate, absent rate, and status. The Smart-Hadir is advantageous as it can be used to capture meeting or event attendance record as well.


2017 ◽  
Vol 4 (1) ◽  
pp. 8-19 ◽  
Author(s):  
Fatich Fazlur Rochman ◽  
Indra Kharisma Raharjana ◽  
Taufik Taufik

Universitas Airlangga students often find it difficult to verify the mark that came out in the Kartu Hasil Studi (KHS) is called Study Result Card or courses taken in the Kartu Rencana Studi (KRS) is called Study Plan Card, if there are changes to the data on the system used Universitas Airlangga. This complicated KRS and KHS verification process happened because the KRS and KHS documents that owned by student is easier to counterfeit than the data in the system. Implementation digital signature and QR Code technology as a solution that can prove the validity of KRS or KHS. The KRS and KHS validation system developed by Digital Signature and QR Code. QR Code is a type of matrix code that was developed as a code that allows its contents to be decoded at high speed while the Digital Signature has a function as a marker on the data to ensure that the data is the original data. The verification process was divided into two types are reading the Digital Signature and printing document that works by scanning the data from QR Code. The application of the system is carried out were the addition of the QR Code on KRS and KHS, required a readiness of human resources.


Sign in / Sign up

Export Citation Format

Share Document